- EEG and Brain-Computer Interfaces
- Chaos-based Image/Signal Encryption
- Neuroscience and Neural Engineering
- Advanced Vision and Imaging
- RFID technology advancements
- Neural dynamics and brain function
- Advanced Image and Video Retrieval Techniques
- Medical Image Segmentation Techniques
- User Authentication and Security Systems
- Human Pose and Action Recognition
- Cryptographic Implementations and Security
- Coding theory and cryptography
- Advanced Authentication Protocols Security
- Advanced Memory and Neural Computing
- Veterinary Oncology Research
- Functional Brain Connectivity Studies
- Video Surveillance and Tracking Methods
- Robotics and Sensor-Based Localization
- CCD and CMOS Imaging Sensors
- Advanced Steganography and Watermarking Techniques
- Domain Adaptation and Few-Shot Learning
- AI in cancer detection
- Gaze Tracking and Assistive Technology
- Image Processing Techniques and Applications
- Cellular Automata and Applications
Johannes Kepler University of Linz
2013-2024
RISC Software (Austria)
2022
PATH To Reading
2008
Women's General Hospital
2008
The aim of this paper is to show security measures for NFC (Near Field Communication) use cases and devices. We give a brief overview over technology evaluate the implementation in Out review we derive different applications based on technology. Based assets interfaces an device that could be possible target attacker. In following apply attacks against operation modes how devices protected such attacks. information collected consolidated set threats giving guidelines improve overcome privacy...
The <i>Journal of Electronic Imaging</i> (JEI), copublished bimonthly with the Society for Imaging Science and Technology, publishes peer-reviewed papers that cover research applications in all areas electronic imaging science technology.
The recent emergence of Near Field Communication (NFC) enabled smart phones resulted in an increasing interest NFC security. Several new attack scenarios, using devices either as platform or device under attack, have been discovered. One them is the software-based relay attack. In this paper we evaluate feasibility existing mobile contactless payment system. We give in-depth analysis Google Wallet's credit card functionality. describe our prototypical system that used to successfully mount...
This paper presents an approach to probabilistic active perception planning for scene modeling in cluttered and realistic environments. When dealing with complex, multi-object scenes arbitrary object positions, the estimation of 6D poses including their expected uncertainties is essential. The model keeps track hypotheses over several sequencing sensing actions represent real constellation. To improve detection results tackle occlusion problems a method proposed which reasons about state...
Brain-Computer Interfaces (BCIs) have been used to assist people with impairments since many years. In most of these applications the BCI is intended substitute functions user no longer able perform without help. For example BCIs could be for communication and control devices like robotic arms, wheelchairs or also orthoses prostheses. Another approach not replace motor function itself by controlling a BCI, but utilize rehabilitation that enables restore normal &ldquo;more...
Abstract Objective. Recent trends in brain–computer interface (BCI) research concern the passive monitoring of brain activity, which aim to monitor a wide variety cognitive states. Engagement is such state, interest contexts as learning, entertainment or rehabilitation. This study proposes novel approach for real-time estimation engagement during different tasks using electroencephalography (EEG). Approach. Twenty-three healthy subjects participated BCI experiment. A modified version d2 test...
Near Field Communication's card emulation mode is a way to put virtual smart cards into mobile phones. A recently launched application Google Wallet. Wallet turns phone credit card, prepaid and tool collect gift certificates discounts. Card uses dedicated chips, which are considered fulfill high security standards. Therefore, also be safe secure. However, an NFC-enabled introduces significantly different threat vector. Especially phone's permanent connectivity global network the possibility...
A Brain-Computer Interface (BCI) provides a completely new output pathway that can provide an additional option for person to express himself/her self if he/she suffers disorder like amyotrophic lateral sclerosis (ALS), brainstem stroke, brain or spinal cord injury other diseases which impair the function of common pathways are responsible control muscles. For P300 based BCI matrix randomly flashing characters is presented participant. To spell character has attend it and count how many...
Whereas several NFC trials are already established around the world, currently there no mass rolls out yet. This is due to technical as well administrative issues that have be dealt with before rolling such a system. In this paper we present an approach for managing B2B relations in near field communication (NFC) ecosystem offering services based on card emulation like loyalty, payment and ticketing. Out of experiences made from show which needed order manage provide convenience user....
The NFC Forum has released a first candidate for their Signature Record Type Definition. This specification adds digital signatures to the Data Exchange Format (NDEF), which is standardized format storing formatted data on (Near Field Communication) tags and transporting across peer-to-peer links between devices. With an increasing number of applications NDEF technology, more security threats became apparent. signature record type supposed increase application by providing authenticity...
Variation in nuclear size and shape is an important criterion of malignancy for many tumor types; however, categorical estimates by pathologists have poor reproducibility. Measurements characteristics can improve reproducibility, but current manual methods are time-consuming. The aim this study was to explore the limitations develop alternative morphometric solutions canine cutaneous mast cell tumors (ccMCTs). We assessed following evaluation accuracy, prognostic utility: (1) anisokaryosis...
A brain-computer-interface (BCI) allows the user to control a device or software with brain activity. Many BCIs rely on visual stimuli constant stimulation cycles that elicit steady-state evoked potentials (SSVEP) in electroencephalogram (EEG). This EEG response can be generated LED computer screen flashing at frequency, and similar activity elicited pseudo-random sequences (code-based BCI). Using electrocorticography (ECoG) instead of promises higher spatial temporal resolution leads more...
Invasive brain-computer interfaces yield remarkable performance in a multitude of applications. For classification experiments, high-gamma bandpower features and linear discriminant analysis (LDA) are commonly used due to simplicity robustness. However, LDA is inherently static not suited account for transient information that typically present features. To resolve this issue, we here an extension the time-variant feature space. We call method (TVLDA). It intrinsically provides reduction...
Abstract Histopathological examination of tissue samples is essential for identifying tumor malignancy and the diagnosis different types tumor. In case lymphoma classification, nuclear size neoplastic lymphocytes one key features to differentiate subtypes. Based on combination artificial intelligence advanced image processing, we provide a workflow classification with regards their (small, intermediate, large). As baseline our testing, use Unet++ model trained histological images canine...
EEG based Brain-Computer Interfaces (BCIs) often use evoked potentials (P300), steady state visual (SSVEP) or motor imagery (MI) for control strategies. This study investigated maximum and mean accuracy of a MI BCI using Common Spatial Patterns (CSP). Twenty healthy people participated in the were equipped with 64 active electrodes. They performed training paradigm 160 trials by imagining either left right hand movement to set up subject specific CSP filter spatially data. Following that,...
Objective. Several neuroimaging studies have demonstrated that the ventral temporal cortex contains specialized regions process visual stimuli. This study investigated spatial and dynamics of electrocorticographic (ECoG) responses to different types colors stimulation were presented four human participants, a real-time decoder detects discriminates untrained natural images. Approach. ECoG signals from participants recorded while they shown colored greyscale versions seven stimuli (images...
Automated fiber placement (AFP) is an advanced manufacturing technology that increases the rate of production composite materials. At same time, need for adaptable and fast inline control methods such parts raises. Existing inspection systems make use handcrafted filter chains feature detectors, tuned a specific measurement by domain experts. These hardly scale to new defects or different devices. In this paper, we propose formulate AFP defect detection as image segmentation problem can be...
Introduction Brain-computer interfaces (BCIs) based on functional electrical stimulation have been used for upper extremity motor rehabilitation after stroke. However, little is known about their efficacy multiple BCI treatments. In this study, 19 stroke patients participated in 25 followed by lower training sessions. Methods Patients’ state was assessed using two sets of clinical scales the The Upper Extremity Fugl-Meyer Assessment (FMA-UE) and 10-Meter Walk Test (10MWT) were primary...
The integration of deep learning-based tools into diagnostic workflows is increasingly prevalent due to their efficiency and reproducibility in various settings. We investigated the utility automated nuclear morphometry for assessing pleomorphism (NP), a criterion malignancy current grading system canine pulmonary carcinoma (cPC), its prognostic implications. developed algorithm evaluating NP (variation size, i.e., anisokaryosis and/or shape) using segmentation model. Its performance was...
We present two improvement techniques for stereo matching algorithms using silicon retina sensors. verify the results with ground truth data. In contrast to conventional monochrome/color cameras, sensors deliver an asynchronous flow of events instead common framed and discrete intensity or color images. While this kind sensor in a setup enable new fields applications, it also introduces challenges terms image analysis. Using type sensor, have deal sparse event data, thus, less information....
This work considers robot keypoint estimation on color images as a supervised machine learning task. We propose the use of probabilistically created renderings to overcome lack labeled real images. Rather than sampling from stationary distributions, our approach introduces feedback mechanism that constantly adapts probability distributions according current training progress. Initial results show, achieves near-human-level accuracy Additionally, we demonstrate leads fewer required steps,...